RSS feed Get our RSS feed

News by Topic

scribe

Results 276 - 300 of 857Sort Results By: Published Date | Title | Company Name
By: AppDynamics     Published Date: Feb 08, 2018
This white paper describes how containers and microservices work, the benefits and challenges of using them, and how a unified view of the enterprise stack and effective application performance monitoring (APM) can help to fortify their benefits and address their challenges.
Tags : 
     AppDynamics
By: Visible     Published Date: Aug 21, 2009
The biggest problem facing CIO's today is their existing applications. This paper describes the problem and describes our permanent solution, Enterprise Application Integration.
Tags : integration, application integration, application security, collaboration, data sharing, data integration, business integration, efficiency
     Visible
By: IBM     Published Date: Jul 23, 2009
ECM can and should be applied across the enterprise as a whole. Focusing on ECM as described in this free white paper offers a disciplined, pragmatic approach to predicting and managing all types of change across an enterprise, while potentially delivering proven cost benefits and efficiency improvements throughout the organization. Learn more today!
Tags : ibm, ibm telelogic, enterprise change management, ecm, change management
     IBM
By: ArborNetworks     Published Date: Nov 30, 2015
This paper outlines the challenges of DDoS attacks and describes the features you need in a DDoS prevention solution to more effectively protect your network from these threats.
Tags : arbor, ddos, protection, enterprise, data security, security
     ArborNetworks
By: Aerohive     Published Date: Jun 01, 2015
This paper describes how to eliminate the complexity and cost of traditional wireless networks and create one that is ready for mobility.
Tags : mobility, wireless, wlan, wi-fi, mobile applications, mobile users, networks, wireless networks
     Aerohive
By: Microsoft Dynamics     Published Date: Jul 23, 2007
In this white paper, we measure how end users of Enterprise Resource Planning (ERP) applications describe the impact of Microsoft and SAP applications on their business productivity. This research found that Microsoft Dynamics end users on average rated their experience with Microsoft applications more favorably than SAP users rated their experience with SAP.
Tags : sap, microsoft, erp, enterprise resource planning, keystone, microsoft dynamics, productivity, business activity
     Microsoft Dynamics
By: Cisco     Published Date: Apr 11, 2016
Cisco made Application Policy Infrastructure Controller Enterprise Module (APIC-EM) generally available on November 3rd, 2015. It is an SDN controller that supports apps that make WAN and access networks easier to deploy and manage. Cisco’s focus on a low-risk, incremental approach to adopting SDN will appeal to its user-base. Cisco needs to describe the policy control capabilities benefits of APIC-EM, and also highlight its power as a platform and its ability to distinguish apps from point solution offerings from many other companies with competitive features.
Tags : esg brief, cisco apic, sdn controller, wan, sdn
     Cisco
By: Schneider Electric     Published Date: Jun 04, 2014
70% of data center outages are directly attributable to human error according to the Uptime Institute’s analysis of their “abnormal incident” reporting (AIR) database1. This figure highlights the critical importance of having an effective operations and maintenance (O&M) program. This paper describes unique management principles and provides a comprehensive, high-level overview of the necessary program elements for operating a mission critical facility efficiently and reliably throughout its life cycle. Practical management tips and advice are also given.
Tags : schneider, electric, data, center, facility, operations, maintenance, management
     Schneider Electric
By: Equinix EMEA     Published Date: May 17, 2019
La guía digital para pagos y comercio describe cómo los líderes de la industria están transformando su ventaja digital para aprovechar una cadena de valor basada en el ecosistema y obtener información en tiempo real y una experiencia fluida. Nuestra estrategia simple de tres pasos ofrece las mejores prácticas comprobadas sobre cómo rediseñar su presencia, integrar las capacidades cloud y SaaS y facilitar nuevas ofertas basadas en la colaboración interconectada.
Tags : 
     Equinix EMEA
By: IBM     Published Date: Oct 13, 2015
Download this white paper from EuropeanCommunications to learn how leading mobile network operators use analytics to create more targeted marketing. Get real-world examples of companies that are using subscriber analytics to reduce customer churn, and find out what it takes to put big data to work in your organization.
Tags : ibm, eu comms, csp, subscriber analytics, analytics, cem, customer experience marketing, targeted marketing
     IBM
By: Neolane, Inc.     Published Date: Dec 30, 2008
Multi-channel or cross-channel marketing: which is better? The differences seem subtle on the surface, but the results are vastly different.  Neolane's new white paper, titled, Multi-channel Marketing Hits the Wall,describes the perils of over-reliance on simplistic multi-channel campaigns, explains how to build the foundation for true cross-channel marketing, and includes real-world examples of organizations that made the transition.
Tags : neolane, multi-channel marketing, cross-channel marketing, cross-channel, direct marketing, crm software, custom content, deliverability
     Neolane, Inc.
By: Melissa Data     Published Date: Nov 18, 2008
Tom Brennan and John Nydam explain the Melissa Data and Stalworth partnership, discuss the business problems caused by bad data, and describe how DQ*Plus provides a complete data quality solution for enterprise applications and commercial databases.
Tags : melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software
     Melissa Data
By: MoveOp     Published Date: Dec 15, 2010
This paper describes critical steps in executing a successful migration of servers and applications to a cloud-base Infrastructure as a Service (IaaS) vendor.
Tags : server migration, migrate to cloud, application migration, unix to linux
     MoveOp
By: IBM     Published Date: Oct 26, 2017
Identity and access management exists for one critical reason—security. Organizations need to make certain the right people have access to the right resources to do their jobs—and that people without proper authorization can’t get in. In an era the IBM X-Force security team recently described as experiencing “an ever-upward trend of more attacks, more leaked records and more varied threats,” security is a critical function for business as well as IT.
Tags : access manager, security, cloud service, microsoft office 365, it strategies
     IBM
By: iDirect     Published Date: Aug 21, 2009
The global demand for voice and data services delivered over cellular networks continues to grow as new markets open and existing ones increase capacity. The networking infrastructure to support subscriber growth and new services have experienced aggressive expansion as the worldwide economy evolves.
Tags : infrastructure, gsm, cellular, telecom, telecommunications, networking infrastructure, network expansion, voice services
     iDirect
By: Nimsoft     Published Date: Oct 24, 2011
This paper describes unique characteristics of cloud service delivery models; details distinct monitoring responsibilities & challenges of each model
Tags : nimsoft, cloud service, delivery, models, monitor, monitoring, challenges
     Nimsoft
By: FICO EMEA     Published Date: Jan 25, 2019
A leading communication services company serving more than 50 million individual, business and government subscribers across the United States.
Tags : analytics, artificial intelligence, customer lifecycle, insights, telecom credit lifecycle, customer acquisition, optimisation
     FICO EMEA
By: FICO     Published Date: May 11, 2017
A leading communication services company serving more than 50 million individual, business and government subscribers across the United States.
Tags : customer experience, credit, credit policies
     FICO
By: Dun & Bradstreet     Published Date: Oct 21, 2016
The lifeblood of discrete organizational inputs—customer phone numbers, invoices, marketing prospect lists, inventory calculations, employee job descriptions—once existed in disconnected silos, typically transcribed on carefully guarded pieces of paper, limited in lifespan and scope to the department or person carefully guarding it. Now, the modern organization both enjoys, and drowns in, a proliferation of business data both ripe for strategic possibilities and staggering in complexity. Few are the companies who feel they’ve totally tapped into its power to supercharge their growth efforts. Download this white paper to find out how your company can cultivate key relationships.
Tags : 
     Dun & Bradstreet
By: Microsoft Dynamics     Published Date: Jul 03, 2008
Sound, responsible financial management is at the heart of business success. Download this webcast to learn more about the Microsoft solutions for financial management and business intelligence (BI) that can help you transform your business into a high-performance workplace. We describe how Microsoft business solutions are designed to help you work more efficiently by focusing on the tasks that add the most value to your business and enable you to make more informed decisions based on timely, accurate information.
Tags : business intelligence, financial management, business management, finance, financial, microsoft
     Microsoft Dynamics
By: Financial Force     Published Date: Dec 01, 2017
This IDC Vendor Profile describes FinancialForce.com, a cloud applications company with financial management, ordering and billing, human capital management (HCM), professional services automation (PSA), and supply chain management (SCM) solutions built on the Salesforce1 platform and a 36-year heritage of building financial management solutions at UNIT4 (the former Agresso and CODA products). FinancialForce.com's accounting solution, launched in 2008 as CODA 2go, was the first on - demand financial system built entirely on the Salesforce1 Platform. Backed by Technology Crossover Ventures, Advent International, Salesforce Ventures, and UNIT4, FinancialForce.com's applications continue to be the leading finance and professional services solutions available as native Salesforce1 applications on the AppExchange.
Tags : 
     Financial Force
By: FinancialForce     Published Date: Dec 01, 2017
This IDC Vendor Profile describes FinancialForce.com, a cloud applications company with financial management, ordering and billing, human capital management (HCM), professional services automation (PSA), and supply chain management (SCM) solutions built on the Salesforce1 platform and a 36-year heritage of building financial management solutions at UNIT4 (the former Agresso and CODA products). FinancialForce.com's accounting solution, launched in 2008 as CODA 2go, was the first on - demand financial system built entirely on the Salesforce1 Platform. Backed by Technology Crossover Ventures, Advent International, Salesforce Ventures, and UNIT4, FinancialForce.com's applications continue to be the leading finance and professional services solutions available as native Salesforce1 applications on the AppExchange.
Tags : 
     FinancialForce
By: IBM     Published Date: Oct 16, 2017
This white paper examines how some of the ways organizations use big data make their infrastructures vulnerable to attack. It presents recommended best practices organizations can adopt to help make their infrastructures and operations more secure. And it discusses how adding advanced security software solutions from IBM to their big-data environment can fill gaps that big-data platforms by themselves do not address. It describes how IBM® Security Guardium®, an end-to- end solution for regulatory compliance and comprehensive data security, supports entitlement reporting; user-access and activity monitoring; advanced risk analytics and real-time threat detection analytics; alerting, blocking, encryption and other data protection capabilities, as well as automated compliance workflows and reporting capabilities, to stop threats.
Tags : security, big data, ibm, data protection
     IBM
By: SAS     Published Date: Feb 29, 2012
In a webcast co-hosted by the AMA and SAS, presenters described three areas of focus for using social media, and the five best practices for being effective in social media. This paper provides a summary of that webcast.
Tags : sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics
     SAS
By: IBM Software     Published Date: Feb 14, 2011
This white paper from IBM describes how a set of five predictive imperatives can help ensure that your company maximizes the value of its customer relationships and sustains higher levels of revenues and profits.
Tags : ibm cognos, predictive imperatives, customer value, customer relationship, crm
     IBM Software
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics